Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 149 Next »

15%
OpenStack installation with the Packstack installer
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Tom Wang, Fotolia.com
(IaaS; e.g., OpenStack and Amazon Web Services), which provides the entire virtual infrastructure, including servers, mass storage, and virtual networks, and Storage as a Service (SaaS; e.g., Dropbox
15%
Putting an Active Directory domain controller in the Azure cloud
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sergey Nivens, 123RF.com
with existing infrastructure in a hybrid configuration. A hybrid network lets you keep your most essential core resources close and local, while still enjoying the benefits of a cloud for scaling to meet demand
14%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
to preempt the hackers and identify and close the gaps. Kali Linux can help. To maintain the security of a network, you need to check it continuously for vulnerabilities and other weak points through
14%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
Bro [1] is high-quality security monitoring tool designed to discover and analyze traffic trends on your network. Bro provides in-depth analysis of network traffic without limiting itself
14%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
NetScaler is a network product that works as an application accelerator and firewall. In other words, integration of the product into the enterprise is best handled by networking experts, because
14%
What to Know Before Moving into HPC
08.04.2025
Home »  Articles  » 
acceptable. The next step is to go beyond a list of commands and emphasize HPC concepts that go along with the commands. Networking In undergraduate engineering, faculty always advise you to take more math
14%
Deploying OpenStack in the cloud and the data center
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © johnjohnson, 123RF.com
of the setup that are responsible for collecting and managing hardware nodes: For example, a new computer receives a response from a MAAS server when it sends a PXE request after first starting up its network
14%
NVMe-oF gears up to replace iSCSI
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Mathew Browne on Unsplash
Centralized storage in the form of network-attached storage (NAS) or a storage area network (SAN) are implicitly or explicitly set in stone in the data center. Wherever you look, you will likely
14%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
of an archeological excavation site than a technology company. Wrapped up in this dilemma is enterprise devotion to endpoint security in a local network, which encounters problems when administering clients outside
14%
Enlarging the TCP initial window
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Jani Brumat on Unsplash
of TCP has always been that it maximizes the available network bandwidth. However, it avoids overloading the individual components in the connection or their buffers by splitting the payload

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice